Cybersecurity Central

This page is for Blount County's users to learn more about protecting themselves and the network from cyber attacks. 

Security Q & A:  

Q: What is phishing?

          A: A phishing attack is when an email is sent from someone who poses as a reliable source and tricks a user into giving away financial information or allowing access to a network. This stolen information is then used to extort a person or organization. 

Q: How can I tell if an email is a phishing email? 

          A: The email may appear to be from a legitimate source or include infected links and attachments that seem harmless, so it’s sometimes difficult to tell. The seemingly harmless email will try to steal financial information or could contain a virus called ransomware. Watch the short video below to learn how to distinguish a potentially harmful email.

VIDEO- What is Phishing and How do I Protect Myself? (2 min 28 sec)

Q: What should I do if I receive a phishing email?

          A: You should NEVER open, respond to, or forward emails that may be a threat. If you believe HR, IT, or Accounting my need your assistance, call them directly. NEVER submit sensitive information (passwords, banking info, Social Security, etc.) via email. Do not download attachments or click on links without double checking that the sender is legitimate.

Q: I received a notification from Google about my account security, what should I do?

          A: These alerts should always be taken seriously- so notify Blount County IT immediately.

Q: How can I make sure I’m staying secure when browsing the web?

          A: Make sure you leave sites that have suspicious pop-ups or give warnings of malware. Always check that a site has "https://" at the beginning. Check out the video below for more.

VIDEO- Internet Safety:Your Browser's Security Features (2 min 21 sec)

Q: What is ransomware?

          A: Ransomware is a virus that locks your computer and demands a ransom for the release of your files. They often appear as a harmless link or download and later reveal themselves. Watch the video below to see an example of a ransomware attack. Note that a ransomware attack can happen in many different ways or may look different, but any type of ransomware is still harmful.

VIDEO- Ransomware Simulation (3 min 12 sec)

Q: How do I protect myself against ransomware?

          A: Follow all of the security processes listed above (safe web browsing, staying alert for phishing attacks, being cautious of what software you download or run, etc.), and if you do happen to become infected, unplug your blue Ethernet cable or remove yourself from WiFi, and turn off your computer IMMEDIATELY. Removing yourself from the network may prevent the ransomware from spreading through the network and infecting more files. Aside from that, there’s not much that anyone can do after they have been infected besides lose files or money, so it’s vital that we avoid it in the first place, but no pressure.

For all of the new security measures you should be taking, click here.